Systems Security Certified Practitioner: Cryptography

Systems Security Certified Practitioner: Cryptography

Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisite
None

Expected Duration
64 minutes

Description
Enterprise assets, including data, must be protected at all times, including when stored, accessed, shared, and transmitted. This course provides an overview of cryptography best practices, including hashing, salting, encryption, and digital signature usage. It also covers cryptography regulatory requirements and best practices for implementing and operating cryptographic systems, including PKI and Web of Trust. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Objective

Fundamental Cryptography Concepts

start the course

describe purpose and best practices for applying hashing

describe purpose and best practices for applying salting

distinguish between symmetric and asymmetric encryption application

describe characteristics and best practices for applying digital signatures

describe characteristics and best practices for applying non-repudiation

Understanding Cryptography Requirements

describe the purpose and role of data sensitivity in cryptography

identify regulatory requirements for cryptography

identify end-user training best practices related to cryptography

Supporting Secure Protocols

compare differences in implementation methodologies

describe best practices for appropriate use of security protocols

Implementing Cryptographic Systems

identify fundamental key management concepts of cryptographic systems

describe how to use PKI as part of implementing and operating cryptographic systems

describe administration and validation activities as part of operating and implementing cryptographic systems

describe characteristics of Web of Trust

identify best practices for implementing secure protocols

Practice: Cryptography & Secure Protocols

identify best practices for implementing and operating cryptographic systems and controls